Which of the following actions that can be taken by the Data Leak Prevention scanning? (Choose three.)
A. Block
B. Reject
C. Tag
D. Log only
E. Quarantine IP address
Which of the following actions that can be taken by the Data Leak Prevention scanning? (Choose three.)
A. Block
B. Reject
C. Tag
D. Log only
E. Quarantine IP address